06.03.2017 Views

N10-006 Latest Certification

Provided study material for N10-006 Certification Test is created and checked by authorized persons of relevant industry. You can use this PDF training kits to pass your exam. For more info please visit here: http://www.certifyschool.com/product/N10-006/

Provided study material for N10-006 Certification Test is created and checked by authorized persons of relevant industry. You can use this PDF training kits to pass your exam. For more info please visit here: http://www.certifyschool.com/product/N10-006/

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Comptia<br />

<strong>N10</strong>-<strong>006</strong><br />

CompTIA Network+ <strong>Certification</strong> Exam<br />

Product Version<br />

Full Version Features:<br />

90 Days Free Updates<br />

30 Days Money Back Guarantee<br />

Instant Download Once Purchased<br />

24 Hours Live Chat Support<br />

Verified Answers by Experts<br />

For More Information – Visit link below:<br />

http://www.certifyschool.com/<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


Question: 1<br />

A technician needs to limit the amount of broadcast traffic on a network and allow different segments<br />

to communicate with each other. Which of the following options would satisfy these requirements?<br />

A. Add a router and enable OSPF.<br />

B. Add a layer 3 switch and create a VLAN.<br />

C. Add a bridge between two switches.<br />

D. Add a firewall and implement proper ACL.<br />

Answer: B<br />

Explanation:<br />

We can limit the amount of broadcast traffic on a switched network by dividing the computers into<br />

logical network segments called VLANs.<br />

A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN<br />

even if they are on separate IP subnets. These logical subnets are configured in the network switches.<br />

Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive<br />

broadcast traffic.<br />

Toallow different segments (VLAN) to communicate with each other, a router is required to establish a<br />

connection between the systems. We can use a network router to route between the VLANs or we can<br />

use a ‘Layer 3’ switch. Unlike layer 2 switches that can only read the contents of the data-link layer<br />

protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network<br />

layer protocol header as well.<br />

Question: 2<br />

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of<br />

multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the<br />

disruption of service?<br />

A. Layer 3 switch<br />

B. Proxy server<br />

C. Layer 2 switch<br />

D. Smart hub<br />

Explanation:<br />

Answer: A<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


The question states that the traffic being transported is a mixture of multicast and unicast signals. There<br />

are three basic types of network transmissions: broadcasts, which are packets transmitted to every node<br />

on the network; unicasts,which are packets transmitted to just one node; and multicasts, which are<br />

packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we<br />

would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2switches that can only read<br />

the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read<br />

the (IP) addresses in the network layer protocol header as well.<br />

Question: 3<br />

Which of the following network devices use ACLs to prevent unauthorized access into company<br />

systems?<br />

A. IDS<br />

B. Firewall<br />

C. Content filter<br />

D. Load balancer<br />

Answer: B<br />

Explanation:<br />

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls<br />

arefrequently used to prevent unauthorized Internet users from accessing privatenetworks connected<br />

to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is<br />

allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall,<br />

which examines each message and blocks or allows the message depending on rules specified in the<br />

ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port<br />

numbers are allowed.<br />

Question: 4<br />

Which of the following is used to define how much bandwidth can be used by various protocols on the<br />

network?<br />

A. Traffic shaping<br />

B. High availability<br />

C. Load balancing<br />

D. Fault tolerance<br />

Answer: A<br />

Explanation:<br />

If a network connection becomes saturated to the point where there is a significant level of contention,<br />

network latency can rise substantially.<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment,<br />

business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the<br />

ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher<br />

priority traffic has been sent.<br />

Question: 5<br />

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).<br />

A. OSPF<br />

B. VTP trunking<br />

C. Virtual PBX<br />

D. RADIUS<br />

E. 802.1x<br />

Answer: D,E<br />

Explanation:<br />

D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user<br />

accounts and passwords used as a central authentication database for users requiring network access.<br />

RADIUS servers are commonly used by ISP’s to authenticate their customer’s Internet connections.<br />

Remote users connect to one or more Remote Access Servers. The remote access servers then forward<br />

the authentication requests to the central RADIUS server.<br />

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an<br />

authentication mechanism to devices wishing to attach to a network.<br />

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication<br />

server. The supplicant is a client that wishes to attach to the network. The authenticator is a network<br />

device,such as an Ethernet switch, wireless access point or in this case, a remote access server and the<br />

authentication server is the RADIUS server.<br />

Question: 6<br />

Which of the following provides accounting, authorization, and authentication via a centralized<br />

privileged database, as well as, challenge/response and password encryption?<br />

A. Multifactor authentication<br />

B. ISAKMP<br />

C. TACACS+<br />

D. Network access control<br />

Explanation:<br />

Answer: C<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles<br />

authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a<br />

centralized authentication solution used to provide access to network resources. TACACS+ separates the<br />

authentication, authorization, and accounting services enabling you to host each service on a separate<br />

server if required.<br />

Question: 7<br />

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same<br />

address. Which of the following should be configured?<br />

A. Leases<br />

B. Helper addresses<br />

C. Scopes<br />

D. Reservations<br />

Answer: D<br />

Explanation:<br />

A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create<br />

a reservation, you need to know the hardware MAC address ofthe network interface card that should<br />

receive the IP address.<br />

For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get<br />

192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure<br />

reservation.<br />

Question: 8<br />

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options<br />

should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP<br />

addresses, to be able to access the Internet and internal company servers? (Select THREE).<br />

A. Default gateway<br />

B. Subnet mask<br />

C. Reservations<br />

D. TFTP server<br />

E. Lease expiration time of 1 day<br />

F. DNS servers<br />

G. Bootp<br />

Explanation:<br />

Answer: A,B,F<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


The question statesthat the client computers need to access the Internet as well as internal company<br />

servers. To access the Internet, the client computers need to be configured with an IP address with a<br />

subnet mask (answer B) and the address of the router that connects thecompany network to the<br />

Internet. This is known as the ‘default gateway’ (answer A).<br />

To be able to resolve web page URLs to web server IP addresses, the client computers need to be<br />

configured with the address of a DNS server (answer F).<br />

Question: 9<br />

A technician just completed a new external website and setup access rules in the firewall. After some<br />

testing, only users outside the internal network can reach the site. The website responds to a ping from<br />

the internal network and resolves the proper public address. Which of the following could the technician<br />

do to fix this issue while causing internal users to route to the website using an internal address?<br />

A. Configure NAT on the firewall<br />

B. Implement a split horizon DNS<br />

C. Place the server in the DMZ<br />

D. Adjust the proper internal ACL<br />

Answer: B<br />

Explanation:<br />

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS<br />

query results depending on the source of the request. This can be done by hardware-basedseparation<br />

but is most commonly done in software.<br />

In this question, we want external users to be able to access the website by using a public IP address. To<br />

do this, we would have an external facing DNS server hosting a DNS zone for the website domain. Forthe<br />

internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain.<br />

The external DNS zone will resolve the website URL to an external public IP address. The internal DNS<br />

server will resolve the website URL to an internal private IP address.<br />

Question: 10<br />

When configuring a new server, a technician requests that an MX record be created in DNS for the new<br />

server, but the record was not entered properly. Which of the following was MOST likely installed that<br />

required an MX record to function properly?<br />

A. Load balancer<br />

B. FTP server<br />

C. Firewall DMZ<br />

D. Mail server<br />

Answer: D<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


Explanation:<br />

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of<br />

the email server responsiblefor accepting email for the recipient’s domain.<br />

For example a user sends an email to recipient@somedomain.com. The sending user’s email server will<br />

query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the<br />

hostnameof the email server responsible for accepting email for the somedomain.com domain, for<br />

example, mailserver.somedomain.com. The sending email server will then perform a second DNS query<br />

to resolve mailserver.somedomain.com to an IP address. The sending mailserver will then forward the<br />

email to the destination mail server.<br />

Question: 11<br />

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?<br />

A. BGP<br />

B. OSPF<br />

C. IS-IS<br />

D. MPLS<br />

Answer: D<br />

Explanation:<br />

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on<br />

the contents of this label, without the need to examine the packet itself.<br />

MPLS works by prefixing packets with an MPLS header, containing one or more labels.<br />

An MPLS router that performs routing based only on the label is called a label switch router (LSR) or<br />

transit router. This is a type of router located in the middle of a MPLS network. It is responsible for<br />

switching the labels used to route packets. When an LSR receives a packet, it uses the label included in<br />

the packet header as an index to determine the next hop on the label-switched path (LSP) and a<br />

corresponding label for the packet from a lookup table. The old label is then removed from the header<br />

and replaced with the new label before the packet is routed forward.<br />

A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry<br />

and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and<br />

remove it off the outgoing packet.<br />

When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine<br />

appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets<br />

into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS<br />

domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding<br />

rules.<br />

Question: 12<br />

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a<br />

POTS line?<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


A. Multilayer switch<br />

B. Access point<br />

C. Analog modem<br />

D. DOCSIS modem<br />

Answer: C<br />

Explanation:<br />

Before ADSL broadband connections became the standard for Internet connections, computers used<br />

analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically<br />

offering a maximum bandwidth of 56Kbps.<br />

An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an<br />

analog signal to be transmitted over a standard (POTS) phone line. The modem then converts<br />

(demodulates) the incoming analog signal to digital data to be used by the computer.<br />

An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone<br />

does.<br />

Question: 13<br />

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector.<br />

Which of the following protocols was MOST likely used on this cable?<br />

A. RS-232<br />

B. 802.3<br />

C. ATM<br />

D. Tokenring<br />

Answer: A<br />

Explanation:<br />

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the<br />

functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. It’s<br />

rare to see a new computer nowadays with a serial port but they were commonly used for connecting<br />

external analog modems, keyboards and mice to computers.<br />

Question: 14<br />

Which of the following connection types is used to terminate DS3 connections in a telecommunications<br />

facility?<br />

A. 66 block<br />

B. BNC<br />

C. F-connector<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


D. RJ-11<br />

Answer: B<br />

Explanation:<br />

A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses<br />

75 ohm coaxial cable and BNC connectors.<br />

Question: 15<br />

An F-connector is used on which of the following types of cabling?<br />

A. CAT3<br />

B. Single mode fiber<br />

C. CAT5<br />

D. RG6<br />

Answer: D<br />

Explanation:<br />

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and<br />

universally forsatellite television and cable modems, usually with RG-6/U cable or, in older installations,<br />

with RG-59/U cable.<br />

Question: 16<br />

While installing new network equipment, a network administrator wants to add infrastructure to keep<br />

the cables organized in the environment. The administrator also needs cables to be easily removed or<br />

added due to the constantly changing environment. Which of the following will BEST fulfill the<br />

requirement?<br />

A. Hook and loop straps<br />

B. Ladder trays<br />

C. Raised floor<br />

D. Cable ties<br />

Explanation:<br />

https://en.wikipedia.org/wiki/Cable_tray#Types<br />

Question: 17<br />

Answer: B<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


A network administrator is troubleshooting an issue with a newly installed web server. The web server is<br />

available to internal users but unavailable to Internet users. The server’s network configuration is shown<br />

below:<br />

Which of the following is the MOST likely reason why the server is unavailable from the Internet?<br />

A. NAT has not been configured on the border firewall.<br />

B. The Layer 3 switchport connecting the web server is blocking port 80.<br />

C. The gateway IP has been incorrectly configured.<br />

D. The configured DNS server is not reachable by the web server.<br />

Answer: C<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/


Powered by TCPDF (www.tcpdf.org)<br />

For More Information – Visit link below:<br />

http://www.certifyschool.com/<br />

Thanks for Using Our Product<br />

Visit us athttp://www.certifyschool.com/product/n10-<strong>006</strong>/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!